Academic literature on the topic 'LI. Authentication, and access control'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'LI. Authentication, and access control.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "LI. Authentication, and access control"
Junquera-Sánchez, Javier, Carlos Cilleruelo, Luis De-Marcos, and José-Javier Martinez-Herráiz. "Access Control beyond Authentication." Security and Communication Networks 2021 (October 1, 2021): 1–11. http://dx.doi.org/10.1155/2021/8146553.
Full textSandhu, Ravi, and Pierangela Samarati. "Authentication, access control, and audit." ACM Computing Surveys 28, no. 1 (March 1996): 241–43. http://dx.doi.org/10.1145/234313.234412.
Full textLiu, Jing, Yang Xiao, and C. L. Philip Chen. "Internet of things' authentication and access control." International Journal of Security and Networks 7, no. 4 (2012): 228. http://dx.doi.org/10.1504/ijsn.2012.053461.
Full textHarn, L., and H. Y. Lin. "Integration of user authentication and access control." IEE Proceedings E Computers and Digital Techniques 139, no. 2 (1992): 139. http://dx.doi.org/10.1049/ip-e.1992.0022.
Full textMa, Binhao, Xurui Zheng, Can Zhao, Yibing Wang, Dejun Wang, and Bo Meng. "A secure and decentralized SSI authentication protocol with privacy protection and fine-grained access control based on federated blockchain." PLOS ONE 17, no. 9 (September 23, 2022): e0274748. http://dx.doi.org/10.1371/journal.pone.0274748.
Full textZuva, T. "Hybridization of Bimodal Biometrics for Access Control Authentication." International Journal of Future Computer and Communication 3, no. 6 (December 2014): 444–51. http://dx.doi.org/10.7763/ijfcc.2014.v3.344.
Full textKakarla, Geeta, and S. Phani Kumar. "Blockchain Powered Mutual Authentication and Access Control Protocol." International Journal of Computer Networks and Applications 9, no. 1 (February 28, 2022): 103. http://dx.doi.org/10.22247/ijcna/2022/211629.
Full textSUMI, Kazuhiko. "Biometrics Authentication and Application to Access Control Systems." Journal of The Institute of Electrical Engineers of Japan 129, no. 4 (2009): 237–40. http://dx.doi.org/10.1541/ieejjournal.129.237.
Full textGalka, Jakub, Mariusz Masior, and Michal Salasa. "Voice authentication embedded solution for secured access control." IEEE Transactions on Consumer Electronics 60, no. 4 (November 2014): 653–61. http://dx.doi.org/10.1109/tce.2014.7027339.
Full textKarger, Paul A. "Authentication and discretionary access control in computer networks." Computers & Security 5, no. 4 (December 1986): 314–24. http://dx.doi.org/10.1016/0167-4048(86)90052-0.
Full textDissertations / Theses on the topic "LI. Authentication, and access control"
SILVESTRE, BRUNO OLIVEIRA. "INTERINSTITUTIONAL ACCESS: AUTHENTICATION AND ACCESS CONTROL." PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO, 2005. http://www.maxwell.vrac.puc-rio.br/Busca_etds.php?strSecao=resultado&nrSeq=6619@1.
Full textO uso de computação distribuída vem expandindo seu escopo, saindo de aplicações em redes locais para aplicações envolvendo diversas instituições. Em termos de segurança, essa expansão introduz desafios em identificar usuários oriundos das diferentes organizações e definir seus direitos de acesso a determinado recurso. Abordagens comuns adotam a replicação do cadastro dos usuários pelas diversas instituições ou o compartilhamente de uma mesma identidade por um conjunto de usuários. Entretanto, essas estratégias apresentam deficiências, demandando, por exemplo, maior esforço de gerência por parte dos administradores e até esbarrando em políticas de privacidade. Neste trabalho propomos uma arquitetura que utiliza o conceito de papéis para a autenticação e o controle de acesso entre diferentes instituições. Baseado em uma relação de confiança entre as organizações, a arquitetura permite que os usuários sejam autenticados na instituições onde estão afiliados e utiliza o papel por eles desempenhados para controlar o acesso aos recursos disponibilizados pelas demais organizações.
Distributed computing has been expanding its scope from local area network applications to wide-area applications, involving different organizations. This expansion implies in several new security challenges, such as the identification of users originating from different organizations and the definition of their access rights. Commom aproaches involve replicating user data in several institutions or sharing identities among sets of users. However, these approaches have several limitations, sucj as the increased management effort of administrators or problems with privacy policies. This work proposes a framework for inter-institucional authentication. The framework is based on the concepts of RBAC (role-based access control) and of trust between organizations.
Johnson, Henric. "Toward adjustable lightweight authentication for network access control /." Karlskrona : Blekinge Institute of Technology, 2005. http://www.bth.se/fou/Forskinfo.nsf/allfirst2/30ef501d402539d3c12570f5005184f4?OpenDocument.
Full textBehrad, Shanay. "Slice specific authentication and access control for 5G." Electronic Thesis or Diss., Institut polytechnique de Paris, 2020. http://www.theses.fr/2020IPPAS007.
Full textThe fifth generation of mobile cellular networks, 5G, is designed to support a set of new use cases and requirements, e.g. concerning quality of service or security. Using the virtualization technologies and the concept of network slicing, the 5G network operators will be able to provide specific connectivity capabilities in order to support these various use cases. Each network slice can be dedicated to a 3rd party (i.e., any business actor that is not the network operator), and be designed to fit its requirements.However, although network slices can be designed by enabling or disabling certain network functions, the Authentication and Access Control (AAC) mechanisms remain the same for all slices, with tightly coupled network components.This thesis proposes 5G-SSAAC (5G Slice-Specific AAC), as an initial step to introduce a more loosely coupled design into the whole 5G network architecture. 5G-SSAAC enables 5G networks to provide various AAC mechanisms to the 3rd parties according to their security requirements. To assess this innovative mechanism, the thesis analyses the consequences of using the 5G-SSAAC on the security of the whole 5G system. The feasibility of the 5G-SSAAC is also presented with the implementation of a fully virtualized mobile network through an OAI (Open Air Interface) based testbed. This work finally evaluates the impact of 5G-SSAAC mechanism on the network load considering the anticipated number of AAC signalling messages compared to the existing AAC mechanisms in cellular networks
OLSSON, JOAKIM. "Method for gesture based authentication in physical access control." Thesis, KTH, Maskinkonstruktion (Inst.), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-209339.
Full textASSA Abloy is the largest global supplier of intelligent locks and security solutions. The company constantly strives to develop new and innovative solutions for physical access control. One concept the company wanted to investigate aimed to allow the user to effortlessly unlock a door using gestures, resulting in a seamless experience. The idea was to use a wearable as a credential device and identifying the user gestures with the sensors supplied by the wearable. The gesture used in this thesis project were knocks, meaning that the user unlocks the door by knocking on it. The main objective of this thesis project was to develop a system allowing knocks to be used as a method of authentication and evaluate the system based on system security and user convenience. The system developed consists of two accelerometer sensors; one located in the wearable and one located in the lock/door. The signals from each sensor are processed and analyzed to detect knocks. The time correlation between the knocks detected by each sensor are analyzed to verify that they originate from the same user. A theoretical model of the system was developed to facilitate the evaluation of the system. The evaluation of the system showed that both the system security and the user continence attained satisfying values. This thesis shows that the concept has high potential but further work is needed. The framework of methods used to evaluate the system in this thesis can in the same way be used to evaluate systems during any further work.
Burdis, Keith Robert. "Distributed authentication for resource control." Thesis, Rhodes University, 2000. http://hdl.handle.net/10962/d1006512.
Full textSubils, Jean-Baptiste. "Authentication Via Multiple Associated Devices." Scholar Commons, 2015. http://scholarcommons.usf.edu/etd/5778.
Full textMay, Brian 1975. "Scalable access control." Monash University, School of Computer Science and Software, 2001. http://arrow.monash.edu.au/hdl/1959.1/8043.
Full textYildirim, Merve. "Security and usability in password authentication." Thesis, University of Sussex, 2017. http://sro.sussex.ac.uk/id/eprint/71873/.
Full textShen, Ziyi. "Red Door: Firewall Based Access Control in ROS." Thesis, University of North Texas, 2020. https://digital.library.unt.edu/ark:/67531/metadc1752358/.
Full textCeccato, Silvia. "Security in Global Navigation Satellite Systems: authentication, integrity protection and access control." Doctoral thesis, Università degli studi di Padova, 2019. http://hdl.handle.net/11577/3425426.
Full textBooks on the topic "LI. Authentication, and access control"
Boonkrong, Sirapat. Authentication and Access Control. Berkeley, CA: Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-6570-3.
Full textTricia, Ballad, and Banks Erin K, eds. Access control, authentication, and public key infrastructure. Sudbury, MA: Jones & Bartlett Learning, 2011.
Find full textLibrary public access workstation authentication. Washington, D.C: Association of Research Libraries, Office of Leadership and Management Services, 2003.
Find full text802.1X port-based authentication. Boca Raton: Auerbach, 2007.
Find full textBrown, Edwin Lyle. 802.1X Port-Based Authentication. London: Taylor and Francis, 2006.
Find full textNational Institute of Standards and Technology (U.S.) and RAND Homeland Security and Defense Center, eds. Influences on the adoption of multifactor authentication. Santa Monica: RAND, 2011.
Find full textLibicki, Martin C. Influences on the adoption of multifactor authentication. Santa Monica: RAND, 2011.
Find full textE, Koontz John, Devaney Judith E. 1943-, National Institute of Standards and Technology (U.S.), and United States. Dept. of Energy, eds. An authentication framework for Web access to remote hosts. Gaithersburg, MD: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 1999.
Find full textNational Institute of Standards and Technology (U.S.). Entity authentication using public key cryptography. Gaithersburg, MD: Information Technology Laboratory, National Institute of Standards and Technology, 1997.
Find full textBurnett, Mark. Perfect Passwords: Selection, Protection, Authentication. Massachusetts, USA: Syngress, 2005.
Find full textBook chapters on the topic "LI. Authentication, and access control"
Boonkrong, Sirapat. "Biometric Authentication." In Authentication and Access Control, 107–32. Berkeley, CA: Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6570-3_5.
Full textBoonkrong, Sirapat. "Password-Based Authentication." In Authentication and Access Control, 71–105. Berkeley, CA: Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6570-3_4.
Full textBoonkrong, Sirapat. "Multi-factor Authentication." In Authentication and Access Control, 133–62. Berkeley, CA: Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6570-3_6.
Full textBasin, David, Patrick Schaller, and Michael Schläpfer. "Authentication and Access Control." In Applied Information Security, 47–67. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-24474-2_4.
Full textBoonkrong, Sirapat. "Introduction to Cryptography." In Authentication and Access Control, 1–30. Berkeley, CA: Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6570-3_1.
Full textBoonkrong, Sirapat. "Public Key Infrastructure." In Authentication and Access Control, 31–43. Berkeley, CA: Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6570-3_2.
Full textBoonkrong, Sirapat. "Methods and Threats of Authentication." In Authentication and Access Control, 45–70. Berkeley, CA: Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6570-3_3.
Full textBoonkrong, Sirapat. "Authentication and Key Establishment Protocols." In Authentication and Access Control, 163–95. Berkeley, CA: Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6570-3_7.
Full textBoonkrong, Sirapat. "Current and Future Trends." In Authentication and Access Control, 197–222. Berkeley, CA: Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6570-3_8.
Full textKirkpatrick, Michael, and Elisa Bertino. "Context-Dependent Authentication and Access Control." In iNetSec 2009 – Open Research Problems in Network Security, 63–75. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-05437-2_6.
Full textConference papers on the topic "LI. Authentication, and access control"
Nabeel, Mohamed. "Session details: Access Control and Authentication." In CODASPY '18: Eighth ACM Conference on Data and Application Security and Privacy. New York, NY, USA: ACM, 2018. http://dx.doi.org/10.1145/3258528.
Full textQi, Lin, and Li Zhi. "Authentication and Access Control in Satellite Network." In 2010 Third International Symposiums on Electronic Commerce and Security (ISECS). IEEE, 2010. http://dx.doi.org/10.1109/isecs.2010.12.
Full textCvrček, Tadeáš, and Petr Dzurenda. "Access Control System Using Multi-factor Authentication." In STUDENT EEICT 2022. Brno: Fakulta elektrotechniky a komunikacnich technologii VUT v Brne, 2022. http://dx.doi.org/10.13164/eeict.2022.190.
Full textFu, Zhi, and John C. Strassner. "Access Control and Authentication for Converged Wireless Networks." In 2006 Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services. IEEE, 2006. http://dx.doi.org/10.1109/mobiq.2006.340423.
Full textFu, Zhi, and John C. Strassner. "Access Control and Authentication for Converged Wireless Networks." In 2006 3rd Annual International Conference on Mobile and Ubiquitous Systems. IEEE, 2006. http://dx.doi.org/10.1109/mobiqw.2006.361755.
Full textNick, William, Joseph Shelton, Cory Sabol, and Albert Esterline. "Federated protocol for biometric authentication and access control." In 2017 Computing Conference. IEEE, 2017. http://dx.doi.org/10.1109/sai.2017.8252195.
Full textde Oliveira, Adriana Esmeraldo, Gustavo Henrique Matos Bezerra Motta, and Leonardo Vidal Batista. "A multibiometric access control architecture for continuous authentication." In 2010 IEEE International Conference on Intelligence and Security Informatics. IEEE, 2010. http://dx.doi.org/10.1109/isi.2010.5484746.
Full textBao, Lichun. "Location Authentication Methods for Wireless Network Access Control." In 2008 IEEE International Performance Computing and Communications Conference (IPCCC). IEEE, 2008. http://dx.doi.org/10.1109/pccc.2008.4745118.
Full textXu, Cheng, Jianliang Xu, Haibo Hu, and Man Ho Au. "When Query Authentication Meets Fine-Grained Access Control." In SIGMOD/PODS '18: International Conference on Management of Data. New York, NY, USA: ACM, 2018. http://dx.doi.org/10.1145/3183713.3183741.
Full text"CERTIFICATE-BASED ACCESS CONTROL AND AUTHENTICATION FOR DHCP." In 1st International Conference on E-business and Telecommunication Networks. SciTePress - Science and and Technology Publications, 2004. http://dx.doi.org/10.5220/0001396100990106.
Full textReports on the topic "LI. Authentication, and access control"
Narayan, K., and D. Nelson. Using Authentication, Authorization, and Accounting Services to Dynamically Provision View-Based Access Control Model User-to-Group Mappings. Edited by R. Presuhn. RFC Editor, December 2010. http://dx.doi.org/10.17487/rfc6065.
Full text